Applying Eye Tracking in Information Security
نویسندگان
چکیده
منابع مشابه
Use of eye tracking technology in eating disorders: Review Study
Eating disorders are among the topics of interest to many researchers and have been studied from several perspectives. According to the Diagnostic and Statistical Manual of Mental Disorders (DSM), these disorders include persistent eating disorders or eating-related behaviors and have different types such as anorexia nervosa, bulimia nervosa, binge-eating disorder, pica, and other disorders tha...
متن کاملApplying Real Options Thinking to Information Security in Networked Organizations
An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and nonrepudiation of authorized users of these assets. We assume that the primary objective of security efforts ...
متن کاملThree-dimensional information in face recognition: an eye-tracking study.
One unresolved question about face perception is: what is the role of three-dimensional information in face recognition? In this study, recognition performance was compared across changes in viewpoint in different depth conditions: a 2D condition without stereo information and a 3D condition where stereo information was present (by viewing the same face images as anaglyphs through 3D glasses). ...
متن کاملApplying the OSI Seven Layer Network Model To Information Security
Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2019
ISSN: 1877-0509
DOI: 10.1016/j.procs.2019.02.062